全文获取类型
收费全文 | 43114篇 |
免费 | 4230篇 |
国内免费 | 3582篇 |
专业分类
电工技术 | 3894篇 |
技术理论 | 6篇 |
综合类 | 4665篇 |
化学工业 | 1005篇 |
金属工艺 | 819篇 |
机械仪表 | 2005篇 |
建筑科学 | 1851篇 |
矿业工程 | 1148篇 |
能源动力 | 647篇 |
轻工业 | 704篇 |
水利工程 | 829篇 |
石油天然气 | 935篇 |
武器工业 | 392篇 |
无线电 | 7442篇 |
一般工业技术 | 1228篇 |
冶金工业 | 750篇 |
原子能技术 | 212篇 |
自动化技术 | 22394篇 |
出版年
2024年 | 156篇 |
2023年 | 394篇 |
2022年 | 770篇 |
2021年 | 1019篇 |
2020年 | 1112篇 |
2019年 | 836篇 |
2018年 | 748篇 |
2017年 | 1051篇 |
2016年 | 1214篇 |
2015年 | 1480篇 |
2014年 | 3229篇 |
2013年 | 2577篇 |
2012年 | 3502篇 |
2011年 | 3980篇 |
2010年 | 2992篇 |
2009年 | 2972篇 |
2008年 | 3130篇 |
2007年 | 3598篇 |
2006年 | 3077篇 |
2005年 | 2702篇 |
2004年 | 2153篇 |
2003年 | 2025篇 |
2002年 | 1445篇 |
2001年 | 1143篇 |
2000年 | 866篇 |
1999年 | 571篇 |
1998年 | 426篇 |
1997年 | 346篇 |
1996年 | 302篇 |
1995年 | 225篇 |
1994年 | 179篇 |
1993年 | 146篇 |
1992年 | 98篇 |
1991年 | 72篇 |
1990年 | 42篇 |
1989年 | 51篇 |
1988年 | 35篇 |
1987年 | 30篇 |
1986年 | 22篇 |
1985年 | 34篇 |
1984年 | 36篇 |
1983年 | 46篇 |
1982年 | 25篇 |
1981年 | 14篇 |
1980年 | 9篇 |
1979年 | 11篇 |
1977年 | 8篇 |
1976年 | 5篇 |
1974年 | 4篇 |
1959年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
ContextEnterprise software systems (e.g., enterprise resource planning software) are often deployed in different contexts (e.g., different organizations or different business units or branches of one organization). However, even though organizations, business units or branches have the same or similar business goals, they may differ in how they achieve these goals. Thus, many enterprise software systems are subject to variability and adapted depending on the context in which they are used.ObjectiveOur goal is to provide a snapshot of variability in large scale enterprise software systems. We aim at understanding the types of variability that occur in large industrial enterprise software systems. Furthermore, we aim at identifying how variability is handled in such systems.MethodWe performed an exploratory case study in two large software organizations, involving two large enterprise software systems. Data were collected through interviews and document analysis. Data were analyzed following a grounded theory approach.ResultsWe identified seven types of variability (e.g., functionality, infrastructure) and eight mechanisms to handle variability (e.g., add-ons, code switches).ConclusionsWe provide generic types for classifying variability in enterprise software systems, and reusable mechanisms for handling such variability. Some variability types and handling mechanisms for enterprise software systems found in the real world extend existing concepts and theories. Others confirm findings from previous research literature on variability in software in general and are therefore not specific to enterprise software systems. Our findings also offer a theoretical foundation for describing variability handling in practice. Future work needs to provide more evaluations of the theoretical foundations, and refine variability handling mechanisms into more detailed practices. 相似文献
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
3.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。 相似文献
4.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
5.
《Energy Policy》2015
This article sounds the alarm that a significant build-out of efficient lighting and renewable energy technologies may be endangered by shortages of rare earths and rare earth permanent magnets. At the moment, China is the predominant supplier of both and its recent rare earth industrial policies combined with its own growing demand for rare earths have caused widespread concern. To diversify supplies, new mining—outside of China—is needed. But what many observers of the “rare earth problem” overlook is that China also dominates in (1) the processing of rare earths, particularly the less abundant heavy rare earths, and (2) the supply chains for permanent magnets. Heavy rare earths and permanent magnets are critical for many renewable energy technologies, and it will require decades to develop new non-Chinese deposits, processing capacity, and supply chains. This article clarifies several misconceptions, evaluates frequently proposed solutions, and urges policy makers outside of China to undertake measures to avert a crisis, such as greater support for research and development and for the cultivation of intellectual capital. 相似文献
6.
7.
基于ISO/IEC17799标准建立了一个综合的信息系统风险分析框架,并运用模糊多准则决策(FMCDM)方法计算信息安全风险,根据风险等级矩阵(RLM)对信息资产风险进行级别划分,最终建立评估信息资产相关风险的完整模型。 相似文献
8.
为实现电源设备乃至通信机房的少人或无人值守和集中维护,必须建立一套完善的电信局动力环境集中监控系统。文中结合番禺区电信局的实际,讨论了提高系统运行可靠性的几点措施,包括硬件方面与软件方面的手段,关键在于加强系统的运行管理。 相似文献
9.
基于多相滤波器的信道化接收机及其应用研究 总被引:16,自引:0,他引:16
本文主要研究了应用多相滤波技术的信道化接收机建模问题。在给定信道频谱划分方案下,推导了基于多相 滤波器的信道化接收机数学模型。并由此模型设计了一个四信道模拟系统。最后用仿真实验结果验证了模型的正确性。 相似文献